Muutke küpsiste eelistusi

E-raamat: User Privacy: A Practical Guide for Librarians

  • Formaat - PDF+DRM
  • Hind: 75,40 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Personal data in the online world has become a commodity. Coveted by criminals, demanded by governments, and used for unsavory purposes by marketers and advertisers, your private information is at risk everywhere. For libraries and librarians, this poses a professional threat as well as a personal one. How can we protect the privacy of library patrons and users who browse our online catalogs, borrow sensitive materials, and use our public computers and networks?

User Privacy: A Practical Guide for Librarians answers that question. Through simple explanations and detailed, step-by-step guides, library professionals will learn how to strengthen privacy protections for:

·Library policies ·Wired and wireless networks ·Public computers ·Web browsers ·Mobile devices ·Apps ·Cloud computing

Each chapter begins with a "threat assessment" that provides an overview of the biggest security risks and the steps that can be taken to deal with them. Also covered are techniques for preserving online anonymity, protecting activists and at-risk groups, and the current state of data encryption.

Arvustused

In light of recent headlines about the data breaches at Facebook, Equifax, etc., public concern about the security of personal information is at an all-time high. Libraries have a duty to take precautions to protect patrons' privacy. This guide summarizes the issues involved in user privacy. The threats to user privacy have increased tremendously since records and library catalogs were first computerized many years ago. Connolly (Cornell Univ. Library) offers recommendations for developing a library privacy policy based on guidelines from the American Library Association. Most of the book focuses on the technical aspects of strengthening a librarys technology infrastructure based on the policy chosen. Securing browsers used by the public and library systems (patron records, online public access catalogs, and ransomware, for example) are of particular concern. In the last several years, users have begun connecting their mobile devices to library wireless networks, posing more complex issues for network security. This book serves well as an overview of the subject for library managers or library IT personnel; Connolly provides sources for additional reading and guidance for those wishing to delve further into a particular subject.

Summing Up: Highly recommended. Graduate students and all library professionals. * CHOICE * Matthew Connolly's book not only describes not only why privacy matters but also gives easy-to-follow steps for protecting user privacy in all types of libraries. I implemented a few of the suggestions on my own devices. This book is recommended for all libraries and librarians. -- Emily J. M. Knox, assistant professor, School of Information Sciences, University of Illinois at Urbana-Champaign

List of Figures
ix
List of Textboxes
xi
Preface xiii
Chapter 1 The Privacy Landscape
1(12)
Chapter 2 Policy and Privacy
13(18)
Chapter 3 Networks and Infrastructure
31(18)
Chapter 4 Public Computers
49(20)
Chapter 5 Web Browsers and Websites
69(20)
Chapter 6 Mobile Devices
89(18)
Chapter 7 Apps
107(18)
Chapter 8 The Cloud
125(18)
Chapter 9 Tor, Privacy Outreach, and the Future of Privacy
143(16)
Index 159(6)
About the Author 165
Matthew Connolly is an application and web programmer at Cornell University Library, where he has worked for more than ten years on a variety of library services and tools for the public and library staff. He holds a Master of Engineering degree from Cornell, specializing in systems engineering. He has published articles in both popular and peer-reviewed journals and co-authored Using iPhones, iPads, and iPods: A Practical Guide for Librarians.